@@ -256,8 +256,8 @@ async def do_sub_proto_handshake(self) -> None:
256
256
msg = cast (Dict [str , Any ], msg )
257
257
# Peers sometimes send a disconnect msg before they send the sub-proto handshake.
258
258
raise HandshakeFailure (
259
- "{ } disconnected before completing sub-proto handshake: {}" . format (
260
- self , msg [ 'reason_name' ]) )
259
+ f" { self } disconnected before completing sub-proto handshake: { msg [ 'reason_name' ] } "
260
+ )
261
261
await self .process_sub_proto_handshake (cmd , msg )
262
262
self .logger .debug ("Finished %s handshake with %s" , self .sub_proto , self .remote )
263
263
@@ -278,8 +278,9 @@ async def do_p2p_handshake(self) -> None:
278
278
if isinstance (cmd , Disconnect ):
279
279
msg = cast (Dict [str , Any ], msg )
280
280
# Peers sometimes send a disconnect msg before they send the initial P2P handshake.
281
- raise HandshakeFailure ("{} disconnected before completing handshake: {}" .format (
282
- self , msg ['reason_name' ]))
281
+ raise HandshakeFailure (
282
+ f"{ self } disconnected before completing sub-proto handshake: { msg ['reason_name' ]} "
283
+ )
283
284
await self .process_p2p_handshake (cmd , msg )
284
285
285
286
@property
@@ -313,7 +314,7 @@ def get_protocol_command_for(self, msg: bytes) -> protocol.Command:
313
314
elif cmd_id < self .sub_proto .cmd_id_offset + self .sub_proto .cmd_length :
314
315
return self .sub_proto .cmd_by_id [cmd_id ]
315
316
else :
316
- raise UnknownProtocolCommand ("No protocol found for cmd_id {}" . format ( cmd_id ) )
317
+ raise UnknownProtocolCommand (f "No protocol found for cmd_id { cmd_id } " )
317
318
318
319
async def read (self , n : int ) -> bytes :
319
320
self .logger .trace ("Waiting for %s bytes from %s" , n , self .remote )
@@ -405,7 +406,7 @@ def handle_p2p_msg(self, cmd: protocol.Command, msg: protocol.PayloadType) -> No
405
406
# update the last time we heard from a peer in our DB (which doesn't exist yet).
406
407
pass
407
408
else :
408
- raise UnexpectedMessage ("Unexpected msg: {} ({})" . format ( cmd , msg ) )
409
+ raise UnexpectedMessage (f "Unexpected msg: { cmd } ({ msg } )" )
409
410
410
411
def handle_sub_proto_msg (self , cmd : protocol .Command , msg : protocol .PayloadType ) -> None :
411
412
cmd_type = type (cmd )
@@ -436,22 +437,23 @@ async def process_p2p_handshake(
436
437
msg = cast (Dict [str , Any ], msg )
437
438
if not isinstance (cmd , Hello ):
438
439
await self .disconnect (DisconnectReason .bad_protocol )
439
- raise HandshakeFailure ("Expected a Hello msg, got {}, disconnecting" . format ( cmd ) )
440
+ raise HandshakeFailure (f "Expected a Hello msg, got { cmd } , disconnecting" )
440
441
remote_capabilities = msg ['capabilities' ]
441
442
try :
442
443
self .sub_proto = self .select_sub_protocol (remote_capabilities )
443
444
except NoMatchingPeerCapabilities :
444
445
await self .disconnect (DisconnectReason .useless_peer )
445
446
raise HandshakeFailure (
446
- "No matching capabilities between us ({}) and {} ({}), disconnecting" .format (
447
- self .capabilities , self .remote , remote_capabilities ))
447
+ f"No matching capabilities between us ({ self .capabilities } ) and { self .remote } "
448
+ f"({ remote_capabilities } ), disconnecting"
449
+ )
448
450
self .logger .debug (
449
451
"Finished P2P handshake with %s, using sub-protocol %s" ,
450
452
self .remote , self .sub_proto )
451
453
452
454
def encrypt (self , header : bytes , frame : bytes ) -> bytes :
453
455
if len (header ) != HEADER_LEN :
454
- raise ValueError ("Unexpected header length: {}" . format ( len (header )) )
456
+ raise ValueError (f "Unexpected header length: { len (header )} " )
455
457
456
458
header_ciphertext = self .aes_enc .update (header )
457
459
mac_secret = self .egress_mac .digest ()[:HEADER_LEN ]
@@ -470,7 +472,9 @@ def encrypt(self, header: bytes, frame: bytes) -> bytes:
470
472
471
473
def decrypt_header (self , data : bytes ) -> bytes :
472
474
if len (data ) != HEADER_LEN + MAC_LEN :
473
- raise ValueError ("Unexpected header length: {}" .format (len (data )))
475
+ raise ValueError (
476
+ f"Unexpected header length: { len (data )} , expected { HEADER_LEN } + { MAC_LEN } "
477
+ )
474
478
475
479
header_ciphertext = data [:HEADER_LEN ]
476
480
header_mac = data [HEADER_LEN :]
@@ -479,15 +483,17 @@ def decrypt_header(self, data: bytes) -> bytes:
479
483
self .ingress_mac .update (sxor (aes , header_ciphertext ))
480
484
expected_header_mac = self .ingress_mac .digest ()[:HEADER_LEN ]
481
485
if not bytes_eq (expected_header_mac , header_mac ):
482
- raise DecryptionError ('Invalid header mac: expected {}, got {}' .format (
483
- expected_header_mac , header_mac ))
486
+ raise DecryptionError (
487
+ f'Invalid header mac: expected { expected_header_mac } , got { header_mac } '
488
+ )
484
489
return self .aes_dec .update (header_ciphertext )
485
490
486
491
def decrypt_body (self , data : bytes , body_size : int ) -> bytes :
487
492
read_size = roundup_16 (body_size )
488
493
if len (data ) < read_size + MAC_LEN :
489
- raise ValueError ('Insufficient body length; Got {}, wanted {}' .format (
490
- len (data ), (read_size + MAC_LEN )))
494
+ raise ValueError (
495
+ f'Insufficient body length; Got { len (data )} , wanted { read_size } + { MAC_LEN } '
496
+ )
491
497
492
498
frame_ciphertext = data [:read_size ]
493
499
frame_mac = data [read_size :read_size + MAC_LEN ]
@@ -497,8 +503,9 @@ def decrypt_body(self, data: bytes, body_size: int) -> bytes:
497
503
self .ingress_mac .update (sxor (self .mac_enc (fmac_seed ), fmac_seed ))
498
504
expected_frame_mac = self .ingress_mac .digest ()[:MAC_LEN ]
499
505
if not bytes_eq (expected_frame_mac , frame_mac ):
500
- raise DecryptionError ('Invalid frame mac: expected {}, got {}' .format (
501
- expected_frame_mac , frame_mac ))
506
+ raise DecryptionError (
507
+ f'Invalid frame mac: expected { expected_frame_mac } , got { frame_mac } '
508
+ )
502
509
return self .aes_dec .update (frame_ciphertext )[:body_size ]
503
510
504
511
def get_frame_size (self , header : bytes ) -> int :
@@ -526,7 +533,8 @@ async def disconnect(self, reason: DisconnectReason) -> None:
526
533
"""
527
534
if not isinstance (reason , DisconnectReason ):
528
535
raise ValueError (
529
- "Reason must be an item of DisconnectReason, got {}" .format (reason ))
536
+ f"Reason must be an item of DisconnectReason, got { reason } "
537
+ )
530
538
self .logger .debug ("Disconnecting from remote peer; reason: %s" , reason .name )
531
539
self .base_protocol .send_disconnect (reason .value )
532
540
self .close ()
@@ -555,10 +563,10 @@ def select_sub_protocol(self, remote_capabilities: List[Tuple[bytes, int]]
555
563
raise NoMatchingPeerCapabilities ()
556
564
557
565
def __str__ (self ) -> str :
558
- return "{} {}" . format ( self .__class__ .__name__ , self .remote )
566
+ return f" { self .__class__ .__name__ } { self .remote } "
559
567
560
568
def __repr__ (self ) -> str :
561
- return "{} {}" . format ( self .__class__ .__name__ , repr ( self .remote ))
569
+ return f" { self .__class__ .__name__ } { self .remote !r } "
562
570
563
571
def __hash__ (self ) -> int :
564
572
return hash (self .remote )
@@ -867,24 +875,24 @@ async def ensure_same_side_on_dao_fork(
867
875
868
876
except (TimeoutError , PeerConnectionLost ) as err :
869
877
raise DAOForkCheckFailure (
870
- "Timed out waiting for DAO fork header from {}: {}" . format ( peer , err )
878
+ f "Timed out waiting for DAO fork header from { peer } : { err } "
871
879
) from err
872
880
except ValidationError as err :
873
881
raise DAOForkCheckFailure (
874
- "Invalid header response during DAO fork check: {}" . format ( err )
882
+ f "Invalid header response during DAO fork check: { err } "
875
883
) from err
876
884
877
885
if len (headers ) != 2 :
878
886
raise DAOForkCheckFailure (
879
- "Peer %s failed to return DAO fork check headers" . format ( peer )
887
+ f "Peer { peer } failed to return DAO fork check headers"
880
888
)
881
889
else :
882
890
parent , header = headers
883
891
884
892
try :
885
893
vm_class .validate_header (header , parent , check_seal = True )
886
894
except ValidationError as err :
887
- raise DAOForkCheckFailure ("Peer failed DAO fork check validation: {}" . format ( err ) )
895
+ raise DAOForkCheckFailure (f "Peer failed DAO fork check validation: { err } " )
888
896
889
897
def _peer_finished (self , peer : BaseService ) -> None :
890
898
"""Remove the given peer from our list of connected nodes.
0 commit comments